Static task
static1
Behavioral task
behavioral1
Sample
8efdd2828b0b20exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
8efdd2828b0b20exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
8efdd2828b0b20exeexeexeex.exe
-
Size
179KB
-
MD5
8efdd2828b0b2028ff0dd3899ea47028
-
SHA1
56198650733aee4d07d11a57676986b30990515d
-
SHA256
ad061c08e7b17e4999c6948d381794a2cf95e3861a866d2209ba7c46c9ce91e4
-
SHA512
680ca7f9be7e992dc66338f8a9ea8f1edad6768c71c5225fd403b6db919d1965a478afa93827a273b9e917223737fbb978dc00a6db4cfd1adbd6185cca8e3ece
-
SSDEEP
3072:4BSF3kHSHUN4yTGnBDhvj3AyxSlLGGwmyK0z2FWqnSGhloPv2:8SF3kHScNTeBDh73ATQJmyKHWDSl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8efdd2828b0b20exeexeexeex.exe
Files
-
8efdd2828b0b20exeexeexeex.exe.exe windows x86
9a8e99aef6e95745bc22ffa8d40cfbbb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
crypt32
CryptBinaryToStringA
CryptStringToBinaryA
CryptDecodeObjectEx
shlwapi
StrStrIW
PathSkipRootW
StrPBrkA
StrCpyNW
PathFindFileNameW
StrStrA
PathMatchSpecW
StrCmpNA
StrSpnA
StrToInt64ExA
PathCombineW
StrToIntA
StrCmpNIW
StrChrA
StrCmpNIA
PathFindFileNameA
StrChrW
StrCmpNW
mpr
WNetOpenEnumW
WNetEnumResourceW
WNetCloseEnum
ws2_32
htons
inet_addr
htonl
shutdown
closesocket
gethostbyname
sendto
inet_ntoa
socket
WSAStartup
kernel32
ExitProcess
RtlUnwind
LocalFree
lstrcmpiA
GetCommandLineW
CreateMutexW
SetErrorMode
GetCurrentProcess
GetProcAddress
GetCurrentThread
WaitForMultipleObjects
TerminateProcess
GetModuleFileNameW
GetCurrentThreadId
SetThreadPriority
GetTempPathW
GetLastError
OutputDebugStringA
SetProcessShutdownParameters
IsBadStringPtrA
SetFilePointer
FlushFileBuffers
MapViewOfFile
UnmapViewOfFile
CreateFileMappingW
IsBadWritePtr
IsBadReadPtr
IsBadStringPtrW
lstrcpyA
PeekNamedPipe
SystemTimeToFileTime
MoveFileExW
SetFileTime
lstrlenW
CreateFileW
CreateProcessA
GetSystemDirectoryA
GetLocalTime
CreatePipe
GetTickCount
ReadFile
FileTimeToSystemTime
OpenEventW
GetFileAttributesW
GetModuleHandleW
TlsAlloc
CreateThread
lstrcpyW
MulDiv
FileTimeToLocalFileTime
DeleteCriticalSection
GetFileTime
VirtualProtect
GetFileSizeEx
CreateEventW
EnterCriticalSection
MoveFileW
lstrlenA
SearchPathW
GetTempFileNameW
FindFirstFileW
GetNativeSystemInfo
GetDriveTypeW
GetLogicalDrives
VirtualFree
FindClose
QueryDosDeviceW
GetTimeFormatW
lstrcmpiW
lstrcatW
FindNextFileW
SetFileAttributesW
HeapReAlloc
HeapAlloc
HeapFree
HeapCreate
HeapValidate
SetLastError
GetProcessHeaps
HeapSetInformation
GetCurrentProcessId
CreateDirectoryW
GetComputerNameA
LeaveCriticalSection
Sleep
InitializeCriticalSection
WriteFile
VirtualAlloc
OutputDebugStringW
SetEvent
lstrcpynW
WaitForSingleObject
lstrcpynA
OpenProcess
SetFilePointerEx
MultiByteToWideChar
GetVersionExW
GetFileSize
WideCharToMultiByte
GetDateFormatW
GetHandleInformation
CloseHandle
CreateToolhelp32Snapshot
GetModuleHandleA
Process32NextW
GetSystemInfo
Process32FirstW
user32
wsprintfW
GetForegroundWindow
RegisterClassExW
UnregisterClassW
DispatchMessageW
DefWindowProcW
RegisterClassW
FillRect
DrawTextA
GetDC
CreateWindowExW
SystemParametersInfoW
PeekMessageW
GetKeyboardLayoutList
GetSystemMetrics
CharLowerBuffA
TranslateMessage
wsprintfA
ReleaseDC
advapi32
CryptAcquireContextW
CryptGetKeyParam
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegQueryValueExW
CreateWellKnownSid
CheckTokenMembership
DuplicateToken
CryptGenRandom
CryptReleaseContext
AdjustTokenPrivileges
FreeSid
AllocateAndInitializeSid
LookupPrivilegeValueW
RegOpenKeyW
GetTokenInformation
OpenProcessToken
RegOpenKeyExW
RegCloseKey
CryptDestroyKey
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
CoInitialize
shell32
SHGetFolderPathW
CommandLineToArgvW
ShellExecuteW
ShellExecuteExW
SHChangeNotify
gdi32
SetTextColor
DeleteDC
GetDeviceCaps
GetDIBits
SetBkColor
SetPixel
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontW
GetObjectW
GetStockObject
ntdll
_alldiv
memcpy
isspace
_allmul
RtlDosPathNameToNtPathName_U
NtDeleteFile
RtlFreeUnicodeString
ZwQuerySystemInformation
tolower
memmove
ZwOpenProcess
memset
_aulldvrm
NtQueryVirtualMemory
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
Sections
.text Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 105KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ